1. Published

    Sliding Windows Succumbs to Big Mac Attack

    Walter, C. D., 2001, CHES 2001. Koç, Ç. K., Naccache, D. & Paar, C. (eds.). Springer, Vol. 2162. p. 286-299 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. E-pub ahead of print

    Slide reduction, revisited—filling the gaps in svp approximation

    Aggarwal, D., Li, J., Nguyen, P. Q. & Stephens-Davidowitz, N., 10 Aug 2020, Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Proceedings. Micciancio, D. & Ristenpart, T. (eds.). Springer, p. 274-295 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12171 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Sleeping Android: The Danger of Dormant Permissions

    Sellwood, J. & Crampton, J., 8 Nov 2013, Proceedings of the ACM Conference on Computer and Communications Security. ACM, p. 55-66 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Sleeping Android: Exploit Through Dormant Permission Requests

    Sellwood, J., 28 Aug 2012, Department of Mathematics Technical Reports: Royal Holloway, University of London.

    Research output: ThesisMaster's Thesis

  5. Published

    Size of broadcast in threshold schemes with disenrollment

    Martin, K. M., Barwick, S. G., Jackson, W-A. & Wild, P. R., 2002, Information Security and Privacy, 7th Australasian Conference, ACISP02. Springer, Vol. 2384. p. 71-88 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  6. Published

    Single--chip 2-port Adapters for Wave Digital Filters

    Tomlinson, A. & Mirza, A. R., 1989, In : Electronics Letters. 25, 23, p. 1553-1555 3 p.

    Research output: Contribution to journalArticle

  7. Published

    Single Track Gray Codes

    Hiltgen, A. P., Paterson, K. G. & Brandestini, M., 1996, In : IEEE Transactions on Information Theory. 42, p. 1555-1561.

    Research output: Contribution to journalArticle

  8. Published

    Single Track Circuit Codes

    Hiltgen, A. P. & Paterson, K. G., 2001, In : IEEE Transactions on Information Theory. 47, 6, p. 2587-2595 9 p.

    Research output: Contribution to journalArticle

  9. Published

    Single sign-on using trusted platforms

    Pashalidis, A. & Mitchell, C. J., 2003, Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 2003, Proceedings. Springer-Verlag, Vol. 2851. p. 54-68 15 p. (Lecture Notes in Computer Science; vol. 2851).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Single sign-on using TCG-conformant platforms

    Pashalidis, A. & Mitchell, C. J., 2005, Trusted Computing. Mitchell, C. J. (ed.). IEE Press, p. 175-193 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  11. Published

    Simulator Problem in User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Dec 2010, 6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom-10). Tang, H. Y. & Fu, X. (eds.). HongKong, China: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. E-pub ahead of print

    Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms

    Liu, S. & Paterson, K. G., 17 Mar 2015, Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings. Katz, J. (ed.). Springer, Vol. 9020. p. 3-26 24 p. (Lecture Notes in Computer Science; vol. 9020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Simulation on a quantum computer

    Schack, R., 2006, In : Informatik Forsch. Entw.. 21, p. 21 1 p.

    Research output: Contribution to journalArticle

  14. Published

    Simulating the Influences of Aging and Ocular Disease on Biometric Recognition Performance

    Borgen, H., Bours, P. & Wolthusen, S. D., 2 Jun 2009, Third International Conference on Advances in Biometrics (ICB 2009). Springer-Verlag, p. 857-867

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Simulating Attack Plans Against ICT Infrastructures

    Baiardi, F., Corò, F., Tonelli, F., Guidi, L. & Sgandurra, D., 2014, Vulnerability, Uncertainty, and Risk: Quantification, Mitigation, and Management - Proceedings of the 2nd International Conference on Vulnerability and Risk Analysis and Management, ICVRAM 2014 and the 6th International Symposium on Uncertainty Modeling and Analysis, ISUMA 2014. American Society of Civil Engineers (ASCE), p. 627-637 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Simplification and Generalisation of the Wu-Wu Broadcasting Cryptosystem

    Martin, K. M., 1998, In : Electronics Letters. 34, 24, p. 2328-2329 2 p.

    Research output: Contribution to journalArticle

  17. Published

    SIMPLE: developing a LBS positioning solution

    Wierenga, J. & Komisarczuk, P., 2005, Proceedings of the 4th International Conference on Mobile and Ubiquitous Multimedia, MUM 2005, Christchurch, New Zealand, December 8-10, 2005. p. 48-55 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes

    Freire, E. S. V., Paterson, K. G. & Poettering, B., 2013, CT-RSA 2013. Dawson, E. (ed.). Springer, Vol. 7779. p. 101-114 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Simple techniques for enhancing the robustness of DSR

    Yau, P-W. & Mitchell, C. J., 2003, Proceedings of the 3rd Scandinavian Workshop on Wireless Ad-hoc Networks (ADHOC '03), Stockholm, Sweden, May 2003. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Simple Power Analysis of Unified Code for ECC Double and Add

    Walter, C. D., 2004, CHES 2004. Joye, M. & Quisquater, J-J. (eds.). Springer, Vol. 3156. p. 191-204 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. E-pub ahead of print

    Simple Encrypted Arithmetic Library - SEAL v2.1

    Chen, H., Laine, K. & Player, R., 19 Nov 2017, Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers. Springer-Verlag, p. 3-18 16 p. (Lecture Notes in Computer Science ; vol. 10323 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Simple algorithm for local conversion of pure states

    Jensen, J. G. & Schack, R., 2001, In : Physical Review A. 63, p. 062303 1 p.

    Research output: Contribution to journalArticle

  23. E-pub ahead of print

    Signposts: Cyprus, the UK and the Future of the SBAs

    Dodds, K-J., Jensen, R. & Constantinou, C., 7 Nov 2015, In : RUSI Journal. 160, 5, p. 36-45 10 p.

    Research output: Contribution to journalArticle

  24. Published

    Signcryption schemes based on the RSA problem

    Dent, A. W. & Malone-Lee, J., 2010, Practical Signcryption. Dent, A. W. & Zheng, Y. (eds.). Springer-Verlag, p. 99-120

    Research output: Chapter in Book/Report/Conference proceedingChapter

  25. Published

    Signal-flow-based analysis of wireless security protocols

    Capar, C., Paterson, K., Goeckel, D., Quaglia, E., Towsley, D. & Zafer, M., May 2013, In : Information and Computation. 226, p. 37–56

    Research output: Contribution to journalArticle

  26. Published

    Shorter Double-Authentication Preventing Signatures for Small Address Spaces

    Poettering, B., 2018, p. 344-361. 18 p.

    Research output: Contribution to conferencePaper

  27. E-pub ahead of print

    Shoe: Towards a Promiscuous Politics of Emergency Evacuation Mobility

    Adey, P., 5 Mar 2020, In : Environment and Planning D: Society and Space. p. 1-19 19 p.

    Research output: Contribution to journalArticle

  28. Published

    Ships, Brooms and the End of Humanity

    Haggman, A., 17 Oct 2015, RHUL Geopolitics & Security.

    Research output: Other contribution

  29. Published

    Shifts on a finite qubit string: A class of quantum baker's maps

    Schack, R. & Caves, C. M., 2000, In : Applicable Algebra in Engineering, Communication and Computing (AAECC). 10, p. 305-310 6 p.

    Research output: Contribution to journalArticle

  30. Published

    Sharing Data through Confidential Clouds: An Architectural Perspective

    Sgandurra, D., Di Cerbo, F., Trabelsi, S., Martinelli, F. & Lupu, E., 7 Aug 2015, Proceedings - 1st International Workshop on TEchnicaland LEgal Aspects of Data pRIvacy and Security, TELERISE 2015. p. 58-61 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Sets of permutations that generate the symmetric group pairwise

    Blackburn, S. R., 2006, In : Journal of Combinatorial Theory, Series A. 113, p. 1572-1581 10 p.

    Research output: Contribution to journalArticle

  32. Published

    Set cover problems in role-based access control

    Chen, L. & Crampton, J., 2009, Proceedings of 14th European Symposium on Research in Computer Security. Springer, p. 689-704 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Serverless protocols for inventory and tracking with a UAV

    Mtita, C., Laurent, M., Sauveron, D., Akram, R. N., Markantonakis, K. & Chaumette, S., 9 Nov 2017, Digital Avionics Systems Conference (DASC), 2017 IEEE/AIAA 36th. St. Petersburg, Florida, USA: IEEE Computer Society Press, p. 1-11 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Sergei Skripal attack: Russian Embassy is fuelling tensions with some very undiplomatic tweets

    Robinson, N. & Miltner, K., 21 Mar 2018, The Conversation.

    Research output: Other contribution

  35. Forthcoming

    Sequential binning privacy model for data with prior knowledge of feature dependencies

    Nouretdinov, I., Darwish, S. & Wolthusen, S., Sep 2017, (Accepted/In press) 1 p. Data Science for Cyber-Security workshop, Sep 25-27 2017

    Research output: Other contribution

  36. Published

    Sequences for OFDM and Multi-Code CDMA: Two Problems in Algebraic Coding Theory

    Paterson, K. G., 2002, Proceedings of Sequences and Their Applications - SETA01. Helleseth, T., Kumar, P. V. & Yang, K. (eds.). Springer, p. 46-71 26 p. (Discrete Mathematics and Theoretical Computer Science Series).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  37. Published

    Separating Hypervisor Trusted Computing Base Supported by Hardware.

    Gebhardt, C., Dalton, C. I. & Tomlinson, A., 1 Oct 2010, p. 79-84. 6 p.

    Research output: Contribution to conferencePaper

  38. Published

    Separable states of $N$ quantum bits

    Schack, R. & Caves, C. M., 1999, Proceedings of the X. International Symposium on Theoretical Electrical Engineering. Mathis, W. & Schindler, T. (eds.). Magdeburg: Otto-von-Guericke University, p. 73-78

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Separability of very noisy mixed states and implications for NMR quantum computing

    Braunstein, S. L., Caves, C. M., Jozsa, R., Linden, N., Popescu, S. & Schack, R., 1999, In : Physical Review Letters. 83, p. 1054-1057 4 p.

    Research output: Contribution to journalArticle

  40. Published

    Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination

    Wolthusen, S. D. & Al-Salloum, Z., 15 Sep 2009, Proceedings of the Fifth International Conference on IT Security Incident Management and IT Forensics 2009. IEEE Computer Society Press, p. 41-53

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Semantics-Driven Introspection in a Virtual Environment

    Tamberi, F., Maggiari, D., Sgandurra, D. & Baiardi, F., 1 Sep 2008, 2008 The Fourth International Conference on Information Assurance and Security. p. 299-302 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Semantic Attestation of Node Integrity in Overlays

    Baiardi, F. & Sgandurra, D., 2010, On the Move to Meaningful Internet Systems: OTM 2010: Confederated International Conferences: CoopIS, IS, DOA and ODBASE, Hersonissos, Crete, Greece, October 25-29, 2010, Proceedings, Part I. Meersman, R., Dillon, T. & Herrero, P. (eds.). Berlin, Heidelberg: Springer Berlin / Heidelberg, p. 656-671 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  43. Published

    Select Response Grouping Proof for RFID Tags

    Leng, X., Lien, Y., Mayes, K., Markantonakis, K. & Chiu, J-H., 2009, Proceedings of the 2009 First Asian Conference on Intelligent Information and Database Systems. Washington, DC, USA: IEEE Computer Society Press, p. 73-77 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Select response grouping proof and its verification protocol for RFID tags

    Lien, Y. H., Leng, X., Mayes, K. E. & Chiu, J-H., 1 Mar 2011, In : International Journal of Intelligent Information and Database Systems. 5, p. 101-118 18 p.

    Research output: Contribution to journalArticle

  45. Published

    Seeing through MIST Given a Small Fraction of an RSA Private Key

    Walter, C. D., 2003, CT-RSA 2003. Joye, M. (ed.). Springer, Vol. 2612. p. 391-402 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Seeing the full picture: The case for extending security ceremony analysis

    Bella, G. & Coles-Kemp, L., 2011, Proceedings of 9th Australian Information Security Management Conference. p. 49-55 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Security-Aware Network Analysis for Network Controllability

    Zhang, S. & Wolthusen, S., 2018, p. 1-7. 7 p.

    Research output: Contribution to conferencePaper

  48. Published

    Security: a technical approach

    Piper, F. C. & Mitchell, C. J., 2000, E-commerce Handbook. Clapperton, G. (ed.). Gee Publishing, p. 9/11-9/20 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  49. Published

    Security, privacy and trust of user-centric solutions

    Akram, R. N., Chen, H-H., Lopez, J., Sauveron, D. & Yang, L., Mar 2018, In : Future Generation Computer Systems. 80, p. 417-420 4 p.

    Research output: Contribution to journalEditorial

  50. Published

    Security, privacy and safety evaluation of dynamic and static fleets of drones

    Akram, R. N., Markantonakis, K., Mayes, K., Habachi, O., Sauveron, D., Steyven, A. & Chaumette, S., 9 Nov 2017, p. 1-12. 12 p.

    Research output: Contribution to conferencePaper

Previous 1...4 5 6 7 8 9 10 11 ...42 Next